SlideShare ist ein Scribd-Unternehmen logo
1 von 15
•A data warehouse by nature is an open, accessible system.

•Aim : Make large amounts of data easily accessible to the
users

•Any Security restrictions seen as obstacles to that goal,
become constrains on the design of data warehouse.

•This is not to say that security is not important; on the
contrary ,security is paramount to ensuring that the data
itself remains clean,consistent and integral.
•It is important to establish early any security and audit
requirements that will be placed on the data warehouse.

•Clearly, adding security will affect performance and design
of data warehouse.

Security can affect many different parts of the data
warehouse such as
                    User Access
                     Data Load
                     Data Movement
                     Query Generation
Data Classification
            Based on sensitivity
            Based by role or job function

User Classification
             Based on Department,Section,Group etc..
                 (User access hierarchy )
             Based on their role
                  (Role access hierarchy )
Data warehouse Inc.




             Sales                              Marketing



                                             Snr Analyst




                                    Analyst                 Analyst
      Administrator               Aggregation               Detailed




 Database             Reference             Summarized             Detailed
Admin Data              Data                 Sales data           Sales data
Data
            Ware House




  Sales                  Marketing
Data Mart                Data Mart




 Users                     Users
Data warehouse Inc.




           Sales                               Marketing


Analyst        Administrator     Snr Analyst        Analyst         Administrator


Analyst                                             Analyst         Administrator


Analyst                                             Analyst


Analyst

           Detailed        Reference         Summarized          Detailed
          Sales data         Data             Sales data      Customer Data
Select
             customer,account_number,sum(value),count(transaction_id)
From
             txn_last_quarter
Where
              transaction_date
                                        between ‘01-jun-96’ and ‘30-jun-96’
Group by
             customer account _number

---------------------------------------Restricting users by using views as--------------------------------------------

Create view sales_lq as
Select
           customer,account_number,sum(value),count(transaction_id)
From
           txn_last_quarter
Where
            transaction_date
                               between ‘01-jun-96’ and ‘30-jun-96’
                      and
                               account_id<>123456789
Group by
           customer account _number
Create view sales_lq as

Select
           customer,account_number,sum(value),count(transaction_id)
From
           txn_last_quarter
Where
           transaction_date
                              between ‘01-jun-96’ and ‘30-jun-96’
                    and
                              account_id<>123456789
                    or
                              account_id<>234567891
Group by
           customer account _number
•Where possible, avoid the use of views to enforce data access restrictions. They can
rapidly become a nightmare to maintain.

•Use Multiple Tables instead of views also creates duplication and overheads.

•Create a dummy field in position or nullify it from the user.
•Legal Requirements
The design team will require some analysts with   knowledge and experience of
business area.

•Audit Requirements
        connections
        •disconnections
        •data access
        •data change


Understand the reasons for each audit requirement.
        Only implement those that are genuinely required for local, company and
    security reasons.
•Network Requirements
When doing the security requirements capture it is important not to overlook issues
      such as network security.

         encryption of data needed?
         which network routes the data can take?

•Data Movement

         Where is the flat file is stored?
         who ha access to that disk space?

         do you backup encrypted or decrypted versions?
         do these backups need special tapes to store ?
         who has access to these tapes ?

         Where that temporary table to be held ?
         how do we make such tables visible ?
•Documentation
It is probably better to document all the restrictions as part of a seperate data
warehouse security policy document.

          Data Classifications
          User Classifications
          Network Requirements
          Data Movement and storage requirements
          All audible actions

•High Security Environments
         Trusted RDBMS
                  ! Trusted RDBMS will generally run on trusted operating systems.
          Covert channels
         ! Avoid creating covert channels that Inadvertently make information
         about data available.

         ! Covert channels are not typically a problem, as the majority of data
         warehouses do not require such high level of security.
•Views
Some of the common restrictions that may apply to the handling of views are
          restricted Data Manipulation Language(DML) operations,
          lost query optimization paths.
          restriction on parallel processing of view projections.

•Data Movement
Different ways in which bulk data movement can occur
                  data loads
                  aggregation creation
                  results temporary tables
                  data extracts

•AUDITING
•APPLICATION DEVELOPMENT

Extra Security code may be needed for each of the process managers :
          load manager
          warehouse manager
          query manager

•Data Base Design

         If a table has three indexes ,three constraints, and five views on it, each copy
of the table will probably add not just the copy but 11 other objects to the database as
well.

•Testing
Further security additions will increase the complexity of the programme cause
increase in errors during testing phase and also additional added functionality to be
Data Warehosing -Security

Weitere ähnliche Inhalte

Andere mochten auch

Mtnl bsnl training
Mtnl bsnl trainingMtnl bsnl training
Mtnl bsnl trainingJasgt Singh
 
Greenwatt technology and company presentation
Greenwatt technology and company presentationGreenwatt technology and company presentation
Greenwatt technology and company presentationGreenwatt
 
Digital marketing for ngo
Digital marketing for ngoDigital marketing for ngo
Digital marketing for ngoJasgt Singh
 
Electricity distribution system in india
Electricity distribution system in indiaElectricity distribution system in india
Electricity distribution system in indiaJasgt Singh
 

Andere mochten auch (12)

Mara Leisure Camp, Kenya
Mara Leisure Camp, KenyaMara Leisure Camp, Kenya
Mara Leisure Camp, Kenya
 
Silverback Lodge, Bwindi, Uganda
Silverback Lodge, Bwindi, UgandaSilverback Lodge, Bwindi, Uganda
Silverback Lodge, Bwindi, Uganda
 
Royal Expeditions India's Big Seven
Royal Expeditions India's Big SevenRoyal Expeditions India's Big Seven
Royal Expeditions India's Big Seven
 
Downsizing and VRS
Downsizing and VRSDownsizing and VRS
Downsizing and VRS
 
Hdmi cables
Hdmi cablesHdmi cables
Hdmi cables
 
Vivir con Diabetes
Vivir con DiabetesVivir con Diabetes
Vivir con Diabetes
 
Mtnl bsnl training
Mtnl bsnl trainingMtnl bsnl training
Mtnl bsnl training
 
Greenwatt technology and company presentation
Greenwatt technology and company presentationGreenwatt technology and company presentation
Greenwatt technology and company presentation
 
Nokia
NokiaNokia
Nokia
 
Digital marketing for ngo
Digital marketing for ngoDigital marketing for ngo
Digital marketing for ngo
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Electricity distribution system in india
Electricity distribution system in indiaElectricity distribution system in india
Electricity distribution system in india
 

Ähnlich wie Data Warehosing -Security

Business Intelligence Data Warehouse System
Business Intelligence Data Warehouse SystemBusiness Intelligence Data Warehouse System
Business Intelligence Data Warehouse SystemKiran kumar
 
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...DATAVERSITY
 
What is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
What is OLAP -Data Warehouse Concepts - IT Online Training @ NewyorksysWhat is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
What is OLAP -Data Warehouse Concepts - IT Online Training @ NewyorksysNEWYORKSYS-IT SOLUTIONS
 
Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Jeffrey T. Pollock
 
클라우드에서의 데이터 웨어하우징 & 비즈니스 인텔리전스
클라우드에서의 데이터 웨어하우징 & 비즈니스 인텔리전스클라우드에서의 데이터 웨어하우징 & 비즈니스 인텔리전스
클라우드에서의 데이터 웨어하우징 & 비즈니스 인텔리전스Amazon Web Services Korea
 
AWS Webcast - Sales Productivity Solutions with MicroStrategy and Redshift
AWS Webcast - Sales Productivity Solutions with MicroStrategy and RedshiftAWS Webcast - Sales Productivity Solutions with MicroStrategy and Redshift
AWS Webcast - Sales Productivity Solutions with MicroStrategy and RedshiftAmazon Web Services
 
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)Denodo
 
Microsoft Dynamics 365 xRM4Legal xRM4Accounting Technical Overview
Microsoft Dynamics 365 xRM4Legal xRM4Accounting Technical OverviewMicrosoft Dynamics 365 xRM4Legal xRM4Accounting Technical Overview
Microsoft Dynamics 365 xRM4Legal xRM4Accounting Technical OverviewDavid Blumentals
 
Pillars of great Azure Architecture
Pillars of great Azure ArchitecturePillars of great Azure Architecture
Pillars of great Azure ArchitectureKarthikeyan VK
 
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the CloudFSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the CloudAmazon Web Services
 
PayPal Decision Management Architecture
PayPal Decision Management ArchitecturePayPal Decision Management Architecture
PayPal Decision Management ArchitecturePradeep Ballal
 
Informix & IWA : Operational analytics performance
Informix & IWA : Operational analytics performanceInformix & IWA : Operational analytics performance
Informix & IWA : Operational analytics performanceKeshav Murthy
 
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Precisely
 
Microsoft Azure Big Data Analytics
Microsoft Azure Big Data AnalyticsMicrosoft Azure Big Data Analytics
Microsoft Azure Big Data AnalyticsMark Kromer
 
Maximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentMaximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentTeradata
 
Commvault - Il Dato è tratto - 09.11.2017
Commvault - Il Dato è tratto - 09.11.2017Commvault - Il Dato è tratto - 09.11.2017
Commvault - Il Dato è tratto - 09.11.2017Eurosystem S.p.A.
 

Ähnlich wie Data Warehosing -Security (20)

Business Intelligence Data Warehouse System
Business Intelligence Data Warehouse SystemBusiness Intelligence Data Warehouse System
Business Intelligence Data Warehouse System
 
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
 
What is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
What is OLAP -Data Warehouse Concepts - IT Online Training @ NewyorksysWhat is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
What is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
 
Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!
 
클라우드에서의 데이터 웨어하우징 & 비즈니스 인텔리전스
클라우드에서의 데이터 웨어하우징 & 비즈니스 인텔리전스클라우드에서의 데이터 웨어하우징 & 비즈니스 인텔리전스
클라우드에서의 데이터 웨어하우징 & 비즈니스 인텔리전스
 
AWS Webcast - Sales Productivity Solutions with MicroStrategy and Redshift
AWS Webcast - Sales Productivity Solutions with MicroStrategy and RedshiftAWS Webcast - Sales Productivity Solutions with MicroStrategy and Redshift
AWS Webcast - Sales Productivity Solutions with MicroStrategy and Redshift
 
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
 
Class1
Class1Class1
Class1
 
Microsoft Dynamics 365 xRM4Legal xRM4Accounting Technical Overview
Microsoft Dynamics 365 xRM4Legal xRM4Accounting Technical OverviewMicrosoft Dynamics 365 xRM4Legal xRM4Accounting Technical Overview
Microsoft Dynamics 365 xRM4Legal xRM4Accounting Technical Overview
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Pillars of great Azure Architecture
Pillars of great Azure ArchitecturePillars of great Azure Architecture
Pillars of great Azure Architecture
 
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the CloudFSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
 
PayPal Decision Management Architecture
PayPal Decision Management ArchitecturePayPal Decision Management Architecture
PayPal Decision Management Architecture
 
Informix & IWA : Operational analytics performance
Informix & IWA : Operational analytics performanceInformix & IWA : Operational analytics performance
Informix & IWA : Operational analytics performance
 
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
 
Microsoft Azure Big Data Analytics
Microsoft Azure Big Data AnalyticsMicrosoft Azure Big Data Analytics
Microsoft Azure Big Data Analytics
 
Maximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology InvestmentMaximizing Business Value: Optimizing Technology Investment
Maximizing Business Value: Optimizing Technology Investment
 
Commvault - Il Dato è tratto - 09.11.2017
Commvault - Il Dato è tratto - 09.11.2017Commvault - Il Dato è tratto - 09.11.2017
Commvault - Il Dato è tratto - 09.11.2017
 
Data Management Strategy
Data Management StrategyData Management Strategy
Data Management Strategy
 
Uses of Data Lakes
Uses of Data LakesUses of Data Lakes
Uses of Data Lakes
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Kürzlich hochgeladen (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Data Warehosing -Security

  • 1.
  • 2. •A data warehouse by nature is an open, accessible system. •Aim : Make large amounts of data easily accessible to the users •Any Security restrictions seen as obstacles to that goal, become constrains on the design of data warehouse. •This is not to say that security is not important; on the contrary ,security is paramount to ensuring that the data itself remains clean,consistent and integral.
  • 3. •It is important to establish early any security and audit requirements that will be placed on the data warehouse. •Clearly, adding security will affect performance and design of data warehouse. Security can affect many different parts of the data warehouse such as User Access  Data Load  Data Movement  Query Generation
  • 4. Data Classification  Based on sensitivity  Based by role or job function User Classification  Based on Department,Section,Group etc.. (User access hierarchy )  Based on their role (Role access hierarchy )
  • 5. Data warehouse Inc. Sales Marketing Snr Analyst Analyst Analyst Administrator Aggregation Detailed Database Reference Summarized Detailed Admin Data Data Sales data Sales data
  • 6. Data Ware House Sales Marketing Data Mart Data Mart Users Users
  • 7. Data warehouse Inc. Sales Marketing Analyst Administrator Snr Analyst Analyst Administrator Analyst Analyst Administrator Analyst Analyst Analyst Detailed Reference Summarized Detailed Sales data Data Sales data Customer Data
  • 8. Select customer,account_number,sum(value),count(transaction_id) From txn_last_quarter Where transaction_date between ‘01-jun-96’ and ‘30-jun-96’ Group by customer account _number ---------------------------------------Restricting users by using views as-------------------------------------------- Create view sales_lq as Select customer,account_number,sum(value),count(transaction_id) From txn_last_quarter Where transaction_date between ‘01-jun-96’ and ‘30-jun-96’ and account_id<>123456789 Group by customer account _number
  • 9. Create view sales_lq as Select customer,account_number,sum(value),count(transaction_id) From txn_last_quarter Where transaction_date between ‘01-jun-96’ and ‘30-jun-96’ and account_id<>123456789 or account_id<>234567891 Group by customer account _number •Where possible, avoid the use of views to enforce data access restrictions. They can rapidly become a nightmare to maintain. •Use Multiple Tables instead of views also creates duplication and overheads. •Create a dummy field in position or nullify it from the user.
  • 10. •Legal Requirements The design team will require some analysts with knowledge and experience of business area. •Audit Requirements connections •disconnections •data access •data change Understand the reasons for each audit requirement. Only implement those that are genuinely required for local, company and security reasons.
  • 11. •Network Requirements When doing the security requirements capture it is important not to overlook issues such as network security.  encryption of data needed?  which network routes the data can take? •Data Movement  Where is the flat file is stored?  who ha access to that disk space?  do you backup encrypted or decrypted versions?  do these backups need special tapes to store ?  who has access to these tapes ?  Where that temporary table to be held ?  how do we make such tables visible ?
  • 12. •Documentation It is probably better to document all the restrictions as part of a seperate data warehouse security policy document.  Data Classifications  User Classifications  Network Requirements  Data Movement and storage requirements  All audible actions •High Security Environments Trusted RDBMS ! Trusted RDBMS will generally run on trusted operating systems.  Covert channels ! Avoid creating covert channels that Inadvertently make information about data available. ! Covert channels are not typically a problem, as the majority of data warehouses do not require such high level of security.
  • 13. •Views Some of the common restrictions that may apply to the handling of views are  restricted Data Manipulation Language(DML) operations,  lost query optimization paths.  restriction on parallel processing of view projections. •Data Movement Different ways in which bulk data movement can occur  data loads  aggregation creation  results temporary tables  data extracts •AUDITING
  • 14. •APPLICATION DEVELOPMENT Extra Security code may be needed for each of the process managers :  load manager  warehouse manager  query manager •Data Base Design If a table has three indexes ,three constraints, and five views on it, each copy of the table will probably add not just the copy but 11 other objects to the database as well. •Testing Further security additions will increase the complexity of the programme cause increase in errors during testing phase and also additional added functionality to be